A flaw has been found in Tenda AC23 16.03.07.52. This impacts an unknown function of the file /goform/WifiExtraSet. This manipulation of the argument wpapsk_crypto causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/xyh4ck/iot_poc/blob/main/Tenda%20AC23_Buffer_Overflow_WifiExtraSet/Tenda%20AC23_Buffer_Overflow_WifiExtraSet.md | Exploit Third Party Advisory |
| https://github.com/xyh4ck/iot_poc/blob/main/Tenda%20AC23_Buffer_Overflow_WifiExtraSet/Tenda%20AC23_Buffer_Overflow_WifiExtraSet.md#poc | Exploit |
| https://vuldb.com/?ctiid.342836 | Permissions Required VDB Entry |
| https://vuldb.com/?id.342836 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.736559 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-26 06:16
Updated : 2026-01-28 14:44
NVD link : CVE-2026-1420
Mitre link : CVE-2026-1420
CVE.ORG link : CVE-2026-1420
JSON object : View
Products Affected
tenda
- ac23_firmware
- ac23
